Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 15:24
Static task
static1
Behavioral task
behavioral1
Sample
c9179f9f8a3a385599aeb4c52ce97541_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c9179f9f8a3a385599aeb4c52ce97541_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c9179f9f8a3a385599aeb4c52ce97541_JaffaCakes118.html
-
Size
3KB
-
MD5
c9179f9f8a3a385599aeb4c52ce97541
-
SHA1
0229c6db3b144c0ffc132ccfce3dfdff6d49f195
-
SHA256
a70f6e9b1233946924ac61578e64dc056f8df11b6170e1b39a96433f54073e6c
-
SHA512
55d6295695abf25dbb8f7e18eb585508425967d4513408c581894007bebf89e144c37d2d72ed6f779e955c0f97f08c065cc6f687264f2025d92523b44fb4fc38
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C640E011-661A-11EF-A372-5E92D6109A20} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000c4e724c42fa44fc9b22604922f0db56a7ec59a246f4f61421cbd2d2452e9d76a000000000e80000000020000200000008b2efb496178bf06c83ac497e212febb33258432d762ffb3c2cd87229c89cecd20000000b46cd4fa71b192cc28be3d1fb0d8244d98e9c4a57a87d4a4b68e8363209ad89b40000000668a73894e8d851b4b959825a1c83666b72c254b6b8cdf93dbf2d003358eece07e6d6122f35e3c4089c17e4952cf616663ba33bc4763f3d6f1ab3646c452c18f iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431106933" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 902e889c27fada01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2988 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2988 iexplore.exe 2988 iexplore.exe 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2100 2988 iexplore.exe 30 PID 2988 wrote to memory of 2100 2988 iexplore.exe 30 PID 2988 wrote to memory of 2100 2988 iexplore.exe 30 PID 2988 wrote to memory of 2100 2988 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c9179f9f8a3a385599aeb4c52ce97541_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2988 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6dcfe92727cda94dda040848742c281
SHA103038cd331419de0789f1c35691288b923edebd2
SHA2564a12994d32cbd28aa25eaea827cb3cc67b7bf5b70997605cf35a310f4ac5b2bb
SHA512b761dbdc5c3c0542ad162726e9844a121c888c7162c893db6b384efc42f93b92585a2b9908c4303cae30ad01c8f70e89932159e48b82d45dfb7c061729d1ff0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574939aa6f65e779158fbed6cfa38e0bd
SHA12bd6731610b82b202c862b69a5a5b993accacd8a
SHA2561c28052f49e6062df1fa62c1c35df0868f3e7d4415789c21a5ce8dfe668b6adb
SHA5127453ea1a6108f72bff39bb38e7ff4d7b525fb7277b8b461e5ffedc94b2a0f4e54282b271b3672254fe8f8b15830fe0f1497a024bffb905778d81f67efa01f3f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559a44d36f294ab82fa9047ff545a9958
SHA17f4b3b813d772f07a4ecdb14afdb83f1a44938dc
SHA256f5e5a3087e14dec8b5dd0217c918acf5c80f86b92af234ed154c394936e58a0a
SHA512de5dd3320792d4859619ca0ff01f2ca933a43c738937662b00aa0b9ab405940099b722b6d1f21f1a3c5fbec35e25600f53e547dc67530af23eb707c6e7240445
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e531cb25e49b02a94de7da29a3f4b48c
SHA11bc734ca0882941a43733a41cc3ee96ba959b588
SHA256f81f56976020bab5b4cad0821cfa0412dbe55ddc7893cea3deaefa244edd81e4
SHA51268ec7aaeb7a7012871ce81acdc1ab3c470366d1eeeabdf7e6101061b1229910589eed52607cc8902a7a2d3ead8271b05142787c2e9214a6e7d1ac545b52f5cff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5080fcba84e6241dff5f1077c8b104841
SHA15a96c1781611f25c20c2f2cb2cd463ba90cb409c
SHA256dbb1e84848662ae2db07914d30e7482384f7eee1078582e3f76ebee69663e975
SHA51202773e250c3257bdaf09a9e8ca48bf28ba646ac68cd1d9ab88a0e06fcdd67227850c45a73043edf9d9c6bf749aad27a85647a34f8ca2ee4462607e395b8fa26c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599a7c0bb4db3f9096ff6235317c1eced
SHA1c992375ac3eb3c8dc960b7c8baca21ee3d4bef8a
SHA25642a55f0dd0c8fe80e1acb1955bc58c4556c610bc6e00bfc4749c6060a528cde7
SHA512b7efd58331f5bc0fa0b2dec55503fcdfb7d74488b1dbdf52623ce23dadf3006483426c1587af0c7a3772498311c9a42dc3a59255ef02f39e97bd453504cb3c9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53711e29b00209a1941bd43cc163ccde7
SHA113dc9e343db79fef0dddce6643f4bb10904191ac
SHA256f56d47d4fd6cebcd86822657f6625653041d4a7a2c24e46db523373647a18a1c
SHA512d9a01276b1504bb523c26ee839ce1b510a076580bf8dfc012d3dcf6fc2ab2f626f57044f3f58632312019c36574c44f315741cabf8db6895d3e194b10781d968
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540a091b20279e28a2ef81c9b4ff81f5b
SHA1359cdcb90482484cdef78a0d818b1a3672a8f000
SHA2564d1a9ebdea73200ffb6f4b3d9203a0b1a16641d8474bc42ad31014d68c76d588
SHA512935507f75afb851b0db7374dbaadb7a3314939fd1e08d8f14c67c8c49d83444d91a673f4482100e84fe0d5829be02bce654bc5ad967d0ea92f945452d77a987f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b09b5fd9b9db9fcc7c287dff2e055dc
SHA1d2bb8983a73f430e5358ea876b955e23fa8bd735
SHA2563d205339f6a5205de08ed231f233897fbbfb1ae294cc8a0eefa48515a34723f0
SHA512a35a9ca9e25c0913c665aa1dd9bebbfa68c8483c19078e73f38f0008ddece963619d1853407c830b20fc1e781921cbb3f4b3ee221f97c3b293c3394e9071604f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fecc0e819ae88d9a783695de1194991d
SHA1d64be94dec586582cda8a021e141f23e43d07cf3
SHA2569807b2a61cce80cc3c801b21779b273939703b1b7073c222ed611d183653fa5a
SHA512bfcdb1c041e7406a6674d9a62bebec7f1845b52561ba7fa71dc0356b643eef83c02e44e6a09662d9d2573e58226c81377477a47089153a0fd8bfc33bca88b735
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502efe88ff0c9950f69ccce219187f290
SHA1be3ff6715600cb2ffd7f6f0c508e9c87daa876e1
SHA2566bbd03ad3b7cc0052f142f7b630fded788071b9f654d27ef8cb6ca9800b84058
SHA51273b5773c6302755968c83ee2a69315d4e5dc28c89022bcc229abada9d5e0bf74bb519112e7fcdb2987714361f957f126dfa62d2721c1a895544a4926954ac5f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d3d92209ca123604f0ef7399409b89b
SHA1b4943204d8f77f35a69f334d315c842093529950
SHA256fec131d095b13bf77b87bff08aef90d1d1e5edea41a291b675c63e2606c06c5b
SHA5123a32a5413ff4de98fc465d03144ca55ab87b138f0178b3c2658db59c85610490e967d3fac0fe65fed99ec92610d33cea3b7a13776ae07a9aa98d824a81158aa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5151fb72aa6d09af7a3739e78b482ba75
SHA11d58f32d88b48fde1eff673ba1bc05e340201010
SHA25696dd201da0fda5c296884a2632a5b86a0f66f0c0901eda022d47ffac17212243
SHA512d13f580a8bebd472561ca8830f43aa127dc07160f1f8a3e04be7ec93eed2e12b7ae9da561579e542920eecaa51d558a849682f6346aa8bc65d52f9f05559b8f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574de78b9adff262456c00ddc4152984c
SHA1a8c32b42d97031e2caff9ab44d3942f2b07c0aee
SHA25628452d2ab86b9d6878f1d39bef9803ef4f50956dc4e2c38096fce39bcc64eecc
SHA512aa8f1fb5e03d2a241e4ec22a0d2a0cf7b049a6f944734a4d2e89f344003de81e31633b3e8166bf02d251c0786e667be4da7c7dfa40e68607e65458f9dcb9a4d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5946562c9bc30974dae054b803467bbe5
SHA11daf2cedc35b39a278333c2b3493908a5f348e58
SHA25687f4fdaad89e9c40234eda67520fdc15383f9e04202b2f99318e70d62aeeb2c8
SHA512ddbe267bc9c22a0806741a98576300d56b7ecf58cc7a60dd6e132171cb1ad39203b7d5e179de4888f010089743f3d333db6c223eeff568866534105cd331b34c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a937c02e132cae6dd023108e303e049d
SHA12716c698d4e9e6f3b518c7086d1a0043aa35f8f9
SHA256673128d835a21b0fd0bd28941b2454ccf60e38758529c9572a025985c313c526
SHA51248997cf11cfc89e06afc559b7c1b8cd9851400d6d054359e3a99b73a842d02c9f955243b5df7b09617d7755c555f3fbae39b1d675c05ad5a6b50595667f05380
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5729bd698550223a1910f6888f4ef4097
SHA13fd76e67e290900a05a3df07deff6ff92880737d
SHA2565b40c9b881b17e04485b828a809c31f545181bc62ccce7f37aaab76e1dcc83d3
SHA512b89200fdb98958bdff889bc5e571564adbb216cb6c7d6fc32de067f4b14d6b150a9d7952c6a8bb976e6ce8b246fd53bbc66fb6d24ca9cd48ce6cef301c4e3e05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5272615288a4f991ca42d17716d68761b
SHA12006b08bd181fd214909b0f64d7c78dd32c8a6bf
SHA256eeb53c8ab37e9ac904b95a515d2d9bab6411217b39c0c2f3ed5adbd60bd499e9
SHA51223d8dd62d349d7d0816f31f772b1c62f978e3de9fd517fa75375f95e11ebb618f6e1d4b3b07e55ccc6418896aaddfb552b9198e6a0893c060088d76ac88fceb3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b